With the development of deep learning in recent years,code representation learning techniques have become the foundation of many software engineering tasks such as program classification[1]and defect detection.Earlier...
supported by National Natural Science Foundation of China(Grant No.61971276);National Natural Science Foundation of Shanghai(Grant No.20ZR1400700);Key R&D Program of Guangdong Province(Grant No.2020B030304002);Shanghai Municipal Science and Technology Major Project(Grant No.2019SHZDZX01);Fundamental Research Funds for the Central Universities and Graduate Student Innovation Fund of Donghua University(Grant No.CUSF-DH-D-2020084)。
In recent years,continuous-variable quantum key distribution(CV-QKD)has been proposed as a promising alternative to the most commonly implemented discrete-variable QKD[1].A typical CV-QKD system includes mainly two ph...
supported by National Natural Sciences Foundation of China(Grant Nos.61831008,62027802,62271165);Guangdong Science and Technology Planning Project(Grant No.2021A1515011572);Shenzhen Natural Science Fund(Grant No.JCYJ20200109112822953);Shenzhen Natural Science Fund(Stable Support Plan Program)(Grant No.GXWD20201230155427003-20200824081029001);Major Key Project of PCL(Grant No.PCL2021A03-1)。
Since demand for data is significantly heterogeneous in cloud storage systems(CSSs),there is traffic congestion in nodes storing hot data.In erasure-coded CSSs,traffic congestion can be alleviated by degraded reads sa...
supported by U.K.Engineering and Physical Sciences Research Council(Grant No.EP/S021-043/1);National Natural Science Foundation of China(Grant Nos.61871257,61902149)。
We present an overview of quantum-safe cryptography(QSC)with a focus on post-quantum cryptography(PQC)and information-theoretic security.From a cryptographic point of view,lattice and code-based schemes are among the ...
Dear editor,With the size and complexity of modern software growing,developers need more efficient tools to accomplish all kinds of routine tasks,such as coding,compiling,and analyzing program structure[1].Among these...
supported by National Natural Science Foundation of China (Grant Nos. 61822202, 61872087, 61841701, 61902070);GuangDong Natural Science Foundation (Grant No. 2019B010137002)
Constructing secure and effective code-based signature schemes has been an open problem. In this paper, we efficiently reduce the key size of the Durandal signature scheme introduced by Aragon et al.(EUROCRYPT 2019). ...
supported by National Key Research and Development Program of China (Grant No. 2016YFB1000801);Shanghai Science and Technology Development Funds (Grant No. 16JC1400801)
Many programming languages and development frameworks have extensive libraries(e.g., JDK and Android libraries) that ease the task of software engineering if used effectively. With numerous library classes and sometim...
supported by National Natural Science Foundation of China (Grant Nos. 61472175, 61472178, 61403187);Natural Science Foundation of Jiangsu Province of China (Grant No. BK20140611);National Key Basic Research and Development Program of China (Grant No. 2014CB340702)
Dynamic features in programming languages support the modification of the execution status at runtime, which is often considered helpful in rapid development and prototyping. However, it was also reported that some dy...
supported by National Natural Science Foundation of China(Grant No.61402113)
Android applications are developed based on framework and are always pattern-based. For Android developers, they can be facilitated by code recommendation to ensure high development efficiency and quality. Existing re...
Dear editor,Wireless transmissions are vulnerable to potential security threats such as eavesdropping and wiretapping since unauthorized reception is facilitated through wireless channels.Traditional system security i...